On Wed, Mar 06, 2013 at 12:44:37PM -0500, Paul Wouters wrote:

> On Wed, 6 Mar 2013, Ond?ej Sur? wrote:
> 
> >If you want to be compatible with DANE, I would suggest to implement
> >the protocol as is, pretty please.
> 
> But since HASTLS seems dead, please interpret "TLSA record present" as
> "don't deliver without TLS"
> 
> *ducks*

No need to duck, if DNSSEC serves-up usable TLSA records, then
indeed Postfix won't deliver without TLS. If *all* the records are
malformed or use unsupported parameters, then my reading of DANE
6698 is that one should behave as though no TLSA records were
present.  This is based on 6698 #4.1:

   If an application receives zero usable certificate associations from
   a DNS request or from its cache, it processes TLS in the normal
   fashion without any input from the TLSA records.  If an application
   receives one or more usable certificate associations, it attempts to
   match each certificate association with the TLS server's end entity
   certificate until a successful match is found.  During the TLS
   handshake, if none of the certificate associations matches the
   certificate given by the TLS server, the TLS client MUST abort the
   handshake.

Are you saying that an RRset consisting entirely of unusable TLSA
records should force TLS (to always fail)?

-- 
        Viktor.
_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to